Cargando…

Network security evaluation using the NSA IEM /

Network Security Evaluation provides a methodology for conducting technical security evaluations of all the critical components of a target network. The book describes how the methodology evolved and how to define the proper scope of an evaluation, including the consideration of legal issues that ma...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Rogers, Russ, Cunningham, Bryan, JD
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Rockland, MA : [Sebastopol, Calif.] : Syngress ; Distributed by O'Reilly Media in the United States and Canada, �2005.
�2005
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Introduction to the IEM; Before You Start Evaluating; Setting Expectations; Scoping the Evaluation; Legal Planning Chapter; The Technical Evaluation Plan (TEP); Starting your On-Site Efforts; Enumeration Activities; Collecting the majority of vulnerabilities; Fine Tuning the Evaluation; On-Site Closing Meeting; Evaluation Analysis; Creating Measurements and Trending Results; Trending Metrics Chapter; Final Reporting Chapter; IEM Summary; Appendix A: Table of example tools for each of the 10 baseline activities; Appendix B: Sample TEP layout.